Which assessment uses a network scanner to identify hosts, services, and vulnerabilities?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which assessment uses a network scanner to identify hosts, services, and vulnerabilities?

Explanation:
The technique being tested is active assessment. Using a network scanner involves sending probes to hosts on the network to elicit responses that reveal what’s alive, which ports are open, what services are running, and what versions or configurations might indicate vulnerabilities. This direct interaction with targets provides detailed, actionable information about the network’s surface, but it also generates noticeable traffic that can trigger security controls. In contrast, passive assessment watches and analyzes existing network traffic without sending probes, so it can reveal some information about hosts and services indirectly but isn’t as precise or thorough for identifying open ports or specific vulnerabilities. The scope of the assessment (external versus internal) describes where the probing might occur, but the key factor here is the active nature of scanning to actively identify hosts, services, and vulnerabilities.

The technique being tested is active assessment. Using a network scanner involves sending probes to hosts on the network to elicit responses that reveal what’s alive, which ports are open, what services are running, and what versions or configurations might indicate vulnerabilities. This direct interaction with targets provides detailed, actionable information about the network’s surface, but it also generates noticeable traffic that can trigger security controls.

In contrast, passive assessment watches and analyzes existing network traffic without sending probes, so it can reveal some information about hosts and services indirectly but isn’t as precise or thorough for identifying open ports or specific vulnerabilities. The scope of the assessment (external versus internal) describes where the probing might occur, but the key factor here is the active nature of scanning to actively identify hosts, services, and vulnerabilities.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy